A Progressive Network Management Architecture Enabled By Java Technology
|
|
- Vernon Lyons
- 8 years ago
- Views:
Transcription
1 A Progressive Network Management Architecture Enabled By Java Technology Damianos Gavalas Communication Networks Research Group Electronic Systems Engineering Dept., University of Essex, Colchester, CO4 3SQ, U.K. Tel: Dominic Greenwood Fujitsu Telecoms. Europe Research Group Northgate House, St. Peters Street, Colchester, CO1 1HH, U.K. Tel: Mohammed Ghanbari Communication Networks Research Group Electronic Systems Engineering Dept., University of Essex, Colchester, CO4 3SQ, U.K. Tel: Mike O Mahony Communication Networks Research Group Electronic Systems Engineering Dept., University of Essex, Colchester, CO4 3SQ, U.K. Tel: mikej@essex.ac.uk Abstract This paper proposes a framework based completely on Java technology. The advantages brought about by the use of Java in network management answer some critical problems existing in current systems. With this work we address several factors concerning interoperability and security in heterogeneous network environments. Specifically, we present a manager application and a multithreaded agent engine that make use of a lightweight communication mechanism for message exchange. A MIB parser is introduced to accelerate handling of incoming management requests, and the RSA public-key cryptosystem is implemented to provide both encryption and authentication features. Results, measured in terms of response time, compare favourably with other published work and standard management frameworks. 1. INTRODUCTION The explosion in the size and complexity of today s local and wide area networks, combined with the increasing demands placed upon them for their resources has resulted in establishing Network Management (NM) as a factor of paramount importance. To further complicate matters, the concept of a single vendor network has vanished into history. Even if a company s network is provided by a single vendor, very soon the requirement to interconnect with related companies by using a mixture of public and/or private networks make the single vendor objective unrealistic. Therefore, an important goal of NM is to support the heterogeneous integrated environment of a network that contains multi-vendor hosts, software packages and carriers. The current state of the art in NM involves a management application (manager) and the managed entities (agents), embedded within Network Elements (NEs). Management interactions make use of the Client/Server model, with the manager collecting status data and setting control variables through the agents. The communication between the managing and the managed entities is facilitated by NM protocols such as the Simple Network Management Protocol (SNMP) [2], part of the TCP/IP protocol suite and the Common Management Information Protocol (CMIP) [3] used in public telecommunication networks. Within these protocols, abstractions of physical resources in a network are represented by managed objects. Collections of managed objects are grouped into a tree-structured Management Information Base (MIB) or Management Information Tree (MIT) following the Abstract Syntax Notation 1 (ASN.1) format and encoded for transport using the BER encoding [4]. The Internet standard MIB-II [6] is an example of a MIB being supported by all the SNMP-managed NEs. Of course, the implementation of the agents (which are typically closed, non extensible
2 applications) are left to the vendors, as long as they understand the protocol standard language and follow the MIB or MIT format and encoding definitions. Despite its wide use, SNMP is known to have several significant disadvantages. The most important among these is the poor community strings-based authentication pattern, adopted by both SNMPv1 and SNMPv2c [9], in addition to the lack of encryption of sensitive NM information. The issue of portability between different hardware architectures or operating systems and the difficulty to extend agent functionality should be also stressed. Another limitation of SNMP is related to the use of BER encoding, which is renowned for its inefficiency. A second issue, regarding the protocol s efficiency is within SNMP itself; SNMP varbind lists are relatively expensive, because the Object Identifiers (OIDs) used to name variables usually take much more space than the actual values. Also, the absence of an efficient table retrieval mechanism means that the overall protocol efficiency suffers from repeated message exchanges (and repeated computations on the agent side). Java technology has recently attracted tremendous attention in the NM field both in research [5][7] and at a commercial level [14]. Both [5] and [7] use TCP as transport protocol, and give a solution to the portability but not to the security problems of SNMP. In addition, they adopt a heavyweight communication mechanism that causes a serious impact on the Network Management System (NMS) performance, both in terms of bandwidth usage and response time. The objective of this work is to explore the feasibility of integrating Java technology in NM. The Java approach explained in this paper is intended to overcome some of the SNMP limitations and reduce the complexity involved in NM. Two different aspects of NM that exhibit several attractive features in comparison with the SNMP-based management are considered. The first involves the manager side; we present an application in the form of a browser tool that automatically discovers network topology and interacts with the managed NEs using an efficient and lightweight communication scheme. The second aspect involves a portable and extensible agent engine that, due to its multithreaded nature, supports concurrent queries from one or more managers. In addition, an efficient MIB parsing method has been implemented at the agent side to speed incoming manager request processing. Security issues have also been investigated such that manager requests are authenticated while data returned from the agents are encrypted. Also, either TCP or UDP protocol stacks can be used for message exchange. As a whole, the presented framework consists of 38 classes amounting to no more than 250 Kb. This relatively small footprint makes the method even more attractive for network devices with limited storage capacity. The rest of the paper is organised as follows: Section 2 summarises the characteristics of Java that make it a suitable platform for the development of NM applications. Section 3 provides an overview of the MIB parser, the manager and the agent application, and describes the exchanged messages between the managing and the managed entities. This section also highlights the differences with the approach taken in [5]. Section 4 deals with associated security issues. Experimental results are reported and discussed in Section 5 whilst Section 6 draws conclusions and considers directions for future work. 2. WHY JAVA FOR NETWORK MANAGEMENT? Network computing based on Java technology is an emerging technology that provides the basis for addressing limitations with legacy management systems. Java can be considered a technology rather than merely as another programming language due to its 'standard'
3 implementation that includes an industrially supported network management infrastructure (JMAPI) [12]. The proposed infrastructure has been entirely developed in Java, chosen due to its numerous attractive features. Firstly, it is architecturally neutral and hence offers the platform independence (portability) required for the management of a multi-faceted heterogeneous environment. Furthermore, it has strong networking support through multithreading, allowing the concurrent execution of several processes. Java also has the facility to obtain local system information through native methods. In addition, the use of management applets allows an operator to remotely manage a network through a standard web browser. The fundamental assumption for our framework is the presence of a Java Virtual Machine (JVM) in every managed NE. Current trends [11] indicate that JVMs may soon be integrated into many network and computing resources. Our framework has been developed using the Java Developer Kit (JDK) 1.1.7, with the Swing package of JDK 1.2, Beta 4, used for the construction of the user interfaces. 3. NM ARCHITECTURE IMPLEMENTATION ISSUES The main components of our proposed architecture consist of a Manager Browser and an Agent Application. The manager browser is responsible for monitoring NEs by sending SNMP-like requests to perform management tasks. The agent application runs as a daemon on each of the managed devices providing an interface between the NMS and the NE resources and serving manager requests. In addition, a MIB parser constructs a Random Access File (RAF) used by the agent to build a tree representation of the MIB objects. The use of the RAF structure reduces the time taken by the agent to map a requested OID to the corresponding object name. The implementation has been tested using the MIB-II definition [6], although the parser accepts any MIB format The Manager Application The manager is a Java application that executes monitoring and control operations through its interaction with the agent processes. The manager adopts a browser style Graphical User Interface (GUI) to ease user interaction Browser Overview The GUI, shown in Figure 1, is the application tool through which the operator controls the managed environment. It facilitates selection of the managed devices to be queried, the transport protocol (TCP or UDP) and settings for both the OID and community strings of the requested MIB object. In addition, the end user can determine (in runtime) whether the messages exchanged are being authenticated and the management data encrypted or not. The browser also maintains a list of the agents, which initially includes the host names of all agent processes in operation at manager initialisation. These active processes are discovered via a manager broadcast poll. Whenever a new agent process starts operation after manager start-up, the manager is notified and the host name appended to the list. Similarly, whenever an agent process terminates, it notifies the manager application, which in turn removes the host name from the browser s list.
4 Figure 1: The Manager Graphical User Interface (GUI) Additional facilities allow the operator to: Navigate the MIB tree; Issue an SNMP-like request; Release a connection; Initiate an automated network discovery process; Obtain an on-line description of a MIB variable (see Figure 2); Set/modify the polling frequency, in runtime; Log operational results into a log file. Figure 2: On-line description of a MIB variable
5 Manager Requests As has been already mentioned, in our approach either TCP or UDP transport protocol may be used for conveying the exchanged requests/responses. The issue of whether management data should be carried over a reliable protocol such as TCP or an unreliable protocol such as UDP has been debated for years. We believe that the network administration should have the choice. Clearly, it is the duty of the administrator to ensure that the proportion of the management data remains low compared to the user data. Thus, in case of oversized networks where packet losses occur due to bursty traffic, management data should be transported with a reliable protocol. TCP should also be the protocol choice in cases that the number of retrieved values per managed device increases (as the number of transferred messages per connection increases, the efficiency of TCP improves). Conversely, for expensive intercontinental WAN links, management data are far less important than user traffic; in these cases management data should be carried over an unreliable transport protocol such as UDP. A simple management query involves establishing a TCP or UDP (depending on the protocol stack choice) socket connection, which remains open for the whole duration of the transaction. Messaging will be then carried by TCP segments or UDP datagrams, respectively. This lightweight communication mechanism differs greatly from that adopted in [5], which relies on Java classes to pass information through the network. In particular, with reference to [5], these classes include the requested OID string and have to be compiled before being transmitted. The receiving agent loads the received class and retrieves the OID string. The same scheme is also used in the return direction. Still, while adopting a heavyweight messaging approach (unnecessary transfers of classes) this framework does not overcome the security weaknesses of SNMP, as the requests are not authenticated and the content of the transferred classes is readable. This process also exhibits the drawback of delay imposed by time-intensive compilation and class loading. In our proposed framework, the following request types may be sent from the manager to the agent entity: Initialise request: This follows a successful connection establishment. The agent responds by returning the first level of the MIB tree. Next_Level / Upper_Level requests: These facilitate the navigation to lower or upper levels of the MIB tree, respectively. In the case of a Next_Level request, the children (next level nodes) of the currently selected node in the browser s MIB tree list will be returned. Otherwise, the agent returns the list of the upper level nodes. Get / Get-Next / Set requests: These have the same functionality as their SNMP counterparts. Their invocation causes the manager to send, together with the command string, the OID string it refers to. The OID string is checked before transmission to ensure its validity. Describe request: This provides on-line viewing of the information (textual OID, syntax, access rights, status, description, etc.) associated with the selected MIB node. Connection_Release request: When received by the agent, the socket connection is released and the separate process (thread) that was created to carry out the manager s requests is terminated. An alternative option for socket-based communication would be the use of Java Remote Method Invocation (RMI). Like sockets, RMI offers a bi-directional association: once an RMI client has bound to an RMI server, both of them can send data to each other. RMI is an
6 elegant solution in terms of design, as it gives a fully object-oriented view of network management while it eases the design of complex applications. However, current RMI implementations are considerably slower and tend to have a high demand on system and network resources, which indicates that RMI-based NM is not sufficiently scalable for widespread applications. The same applies to the Object Management Group s (OMG) Common Object Request Broker Architecture (CORBA); despite the language independence that it brings, CORBA is a complex technology that makes use of heavyweight synchronous protocols, incurring network transport overheads. Thus, for the time being, sockets offer a preferable communication mechanism for NM MIB Parser The MIB parser is a standalone Java application, executed prior to agent initialisation that creates a RAF (through the java.io.randomaccessfile class) using a standard MIB text file for input. The RAF (Table 1) consists of a list of records, one for each of the objects contained in the MIB file, and by its nature allows immediate access to specific records. During agent initialisation, the RAF is used to build a MIB tree representation that is stored in system memory and enhances agent efficiency when handling manager requests. The usefulness of both the RAF and the MIB tree will be clearly shown in the next section. Object Name mib-2 System Interfaces IfType snmpenable AuthenTraps Syntax INTEGER.. INTEGER.. Access read-only read-only Status... Mandatory... mandatory Description The type... stack Indicates... System Parent Node Mgmt mib-2 mib-2 IfEntry snmp Identifier Record Index Table 1: Random Access File structure The parser application compares each of the parsed strings with selected keywords. The MIB file comments are skipped in order to speed the parsing procedure. Each record, included in the resulting RAF contains object name, syntax, access, status and description fields The Java Agent Engine The Java Agent is an application that runs as a background process on a managed node, listening on well-known TCP and UDP ports and waiting for a manager connection request. Upon reception of such a request, the main agent thread forks a slave thread that manages all the requests sent by the manager for the duration of the connection (see Figure 3). The main agent thread is then freed and returns to listening mode awaiting new connection requests. In this manner, a single agent can serve multiple managers simultaneously. When the release of a connection is requested, the slave thread terminates. The Net Discovery thread is used to assist the manager to discover the active agent processes. It listens on a pre-defined UDP port waiting for manager broadcast messages. When receiving such a message this thread replies by sending the manager the IP address of the agent host.
7 Agent Engine Main thread Net Discovery thread Trap thread... Slave threads Figure 3: Threads of the Agent engine 3.4. MIB Tree Structure Description During initialisation, the agent opens the RAF created by the MIB parser and sequentially reads the records stored within. For each of these, a node is inserted into a tree structure (MIB tree) created in system memory. Each of these nodes consists of: 1. The name of the object that the node represents. 2. A vector (dynamic array) containing the next level nodes. 3. An index number indicating the location (offset) of the corresponding record in the RAF. The agent application operation is summarised by the flow diagram in Figure 4. Start Random Access File Read a RAF record Listening mode Insert node into MIB tree Connection request received? No Is MIB tree completed? Yes No Yes Create a Slave thread Figure 4: Agent operation flow diagram Insertion of a node into the MIB tree is achieved through a recursive procedure. The agent makes a search on the existing MIB tree structure, recursively reaching the parent node. If, for instance, the MIB-II object iftype is to be inserted, ifentry will be its parent node. When the parent node is located, a new tree node is constructed containing the name of the inserted object, an empty vector and the index to the RAF, while the vector of the parent node (the list of its children ) is updated. Figure 5 illustrates the resulting mapping of the MIB tree nodes to the RAF record structure.
8 MIB Tree MIBII (1) index = 0 System (1) index = 1 Interfaces(2) index = 2... SNMP (11) index = 10 iftable (2) index = 19 ifentry (1) index = 20 iftype (3) index = 23 MIBII System Interfaces SNMP RAF iftable ifentry iftype Figure 5: Mapping of the MIB tree structure to the Random Access File 3.5. Handling of Manager Requests The existence of the MIB tree greatly reduces the agent s response time to manager requests. Thus, the manager requests, mentioned in section 3.1.2, are handled as indicated below: Initialise request: The root of the MIB tree is returned. Next_Level / Upper_Level requests: A search method is invoked that traces the node for which the next or the upper tree level is requested. In the former case, the agent returns the located node s vector (containing the next level nodes), whereas in the latter the vector of that node s grandparent is returned. Get request: The agent parses the received OID string and follows the corresponding path in the MIB tree. If the object requested belongs to the system MIB-II group, its value is immediately retrieved; otherwise the system s kernel is accessed through native functions. Get-Next and Set requests are handled similarly. Describe request: In this case, when the requested MIB tree node is located the offset of the associated record is also read. The record is then directly accessed and its fields returned by separate TCP segments (or UDP datagrams) to the manager. Figure 6 demonstrates how the slave thread manages the Get and Describe requests. Connection_Release request: The socket connection closes and the slave thread dies.
9 Slave thread starts Wait for a request Parse OID Find node and record s offset in RAF MIB tree Connection release request? No Get request Access system s kernel Describe request Retrieve record Random Access File Yes Termination Return results to manager Figure 6: Slave thread operation for Get and Describe request The use of the MIB tree structure represents a notable improvement in comparison with the parsing method described in [5]. Namely, according to the description given in [5] the mapping of an OID string to the corresponding object name is achieved through the parsing of the actual MIB text file. Hence, the parsing speed is dependent on the location of the requested object in the file, and a significant delay may be imposed Kernel Access Mechanism The native methods available in Java are used to obtain NM-related system information. These methods are integrated into the Java code and are able to call functions written in other programming languages (C, in our case), suitable for accessing the local operating system. Integration is achieved through the Java Native Interface (JNI) [1]. The C code executes a lookup (based on streams, in the case of Solaris 2.5), and acquires a data structure containing all the objects of the MIB group of the requested variable. The object value of interest is then returned to the main Java program. The MIB-II groups currently implemented are ip, tcp, icmp and udp Traps Implementation The agent application has been extended with event report capabilities through the implementation of a trap thread running in parallel with the main agent thread (see Figure 3). The primary task of this thread is to monitor several MIB objects by checking, at regular intervals, their values against a threshold defined by the manager. The trap thread uses the same mechanism described in the previous section to access the kernel (by forking a slave thread). In the case of a monitored object value exceeding the given threshold, the manager is notified by an event report. The manager application is able to append a new object to the list of those already being monitored by sending the name of the object together with a threshold value and the monitoring frequency. 4. SECURITY ISSUES The proposed NMS is designed with several security features that overcome the apparent weaknesses of SNMP and ensure privacy whilst protecting from unauthorised access. In particular, the RSA public-key cryptosystem [8] has been implemented providing both encryption and authentication. The Java Security API (built on top of JDK 1.1) has not been chosen, due to the lack of encryption features, while the recently released Java
10 Cryptography Extension (JCE) 1.2 [13], which supplements the JDK 1.2, provides just a framework but not the actual implementation of encryption algorithms. The RSA algorithm is based on the public-private pair of keys paradigm and its security strength is related to the assumption that detection of the private key (needed to sign or decrypt the transmitted data) is highly improbable. Thus, the steps followed during a single transaction are: i) The manager application signs the request using the private key. The digital signature generated is then sent to the Java agent along with the request message. ii) The SNMP security scheme is maintained and hence the request community name is initially compared with the current agent s community name. Upon success, the agent executes an authentication function in conjunction with the public key and verifies whether the original request message is recovered (this ensures data integrity). If the second security level is successfully passed, the requested service is initiated else a message is returned to the originating host informing of the access denial to system information. iii) The agent encrypts the data to be returned using the public key. iv) The manager decrypts the data received by executing the decryption function, which makes use of the private key. 5. EXPERIMENTAL RESULTS AND DISCUSSION Our experimental setup involves several machines connected through 10Mbps Ethernet segments. Specifically, a Solaris 2.5 UltraSparc-1, two Solaris SparcStation4 s and two 120MHz Pentium PCs running WinNT have been used. The proposed infrastructure has been compared, in terms of response time, with the work of Luderer et al. [5], in addition to a standard SNMP package offered by University of California at Davis [15] (UCD-SNMP ver ), developed in C programming language. The application described in [5] has been implemented as a control model. The manager was run from the UltraSparc-1 and Java Agents were initialised on the other machines Response Time (ms) UDP TCP Implem entation UCD- SNMP Luderer Other groups System group MIB group Figure 7: Comparison of response times measured for various implementations The results shown in Figure 7 indicate that our proposed framework has a slightly longer response time than SNMP (due to the authentication and encryption procedures that
11 are not present UCD-SNMP implementation), whilst an improvement in the order of 25 is achieved in comparison with [5]. Separate measurements have been taken for system and other MIB-II group variables (the latter require access to the system kernel in order to obtain the variable value). The response times were measured at the manager end and averaged for each group. Clearly, thanks to the use of speed-up techniques such as the Just In Time (JIT) compilers, the poor execution speed of Java interpreted bytecode does not represent a significant problem any more. 6. CONCLUSIONS FUTURE WORK We have presented an NMS framework, including both a manager application and an agent engine, completely based on Java technology. Java has been found an excellent development platform, ideally suited to NM applications. Indeed, a number of intrinsic problems of NM can be easily addressed and brought closer to solution. These are: first, the portability across platforms or the independence from the underlying software and hardware architectures, and second, a set of security aspects, such as authentication of incoming requests and encryption of sensitive management information. Moreover, the BER encoding used in the current SNMP frameworks is eliminated in this approach, since the interoperability is supported by the Java bytecode. The administrator is also given the option of using either the TCP or UDP protocol stacks depending on the managed network topology and the traffic conditions. A MIB parser tool improves the efficiency of the NMS, which seems to outperform a framework recently published in the literature. Current and future work address the following areas: Optimisation of the manager and agent code in order to further decrease the response time. Construct an expanding and shrinking representation of the MIB tree on the manager browser. Employ mobile agent technology, so as to reduce the management data volume. 7. REFERENCES [1] Arnold K., Gosling J., The Java Programming Language, Addison-Wesley Publishing Company Inc., [2] Case J., Fedor M., Schoffstall M., Davin J., A Simple Network Management Protocol (SNMP), RFC 1157, May 1990, DDN Network Information Centre, SRI International. [3] ISO/IEC 9596, Information Technology, Open Systems Interconnection, Common Management Information Protocol (CMIP) Part 1: Specification, Geneva, Switzerland, [4] ITU-T, Recommendation X.691, Information Technology ASN.1 Encoding Rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER), ITU, Geneva, Switzerland, July 1994.
12 [5] Luderer G., Ku H., Subbiah B., Narayanan A., "Network Management Agents supported by a Java environment", Proceedings of the 5 th IFIP/IEEE International Symposium on Integrated Network Management (IM 97), 1997, URL: [6] McCloghrie K., Rose M., Management Information Base for Network Management of TCP/IP-based internets: MIB-II, RFC 1213, March [7] Park J.K., Ban N.J., Kim T.G., Java-Based Network Management Environment, Proceedings of the IEEE International Conference on Communications (ICC 98), pp , [8] Rivest R.L., Shamir A., Adleman L., A Method for obtaining Digital Signatures and Public-Key Cryptosystems, Communication of the ACM, 21(2), Feb [9] Stallings W., SNMP, SNMPv2 and CMIP: the Practical Guide to Network Management Standards, Addison-Wesley, Reading, MA, USA, 1993 [10] Sun Microsystems: "Java Language Overview White Paper" [On-line] (1998), URL: [11] Sun Microsystems, Jini Technology White Papers (1999), URL: [12] Sun Microsystems, Java Management Application Programming Interface (JMAPI), 1998, URL: [13] Sun Microsystems, Java Cryptography Extension 1.2, 1998, URL: [14] Thinsoft SNMP Management System, URL: [15] UCD-SNMP Project Home Page (1997), URL:
An Infrastructure for Distributed and Dynamic Network Management based on Mobile Agent Technology
An Infrastructure for Distributed and Dynamic Network Management based on Mobile Agent Technology Damianos Gavalas, Dominic Greenwood *, Mohammed Ghanbari, Mike O Mahony Communication Networks Research
More informationUsing SNMP for Remote Measurement and Automation
Using SNMP for Remote Measurement and Automation Nikolay Kakanakov, Elena Kostadinova Department of Computer Systems and Technologies, Technical University of Sofia, branch Plovdiv, 61 St. Petersburg Blvd.,
More informationSimple Network Management Protocol
A Seminar Report on Simple Network Management Protocol Submitted in partial fulfillment of the requirement for the award of degree Of Computer Science SUBMITTED TO: SUBMITTED BY: www.studymafia.org www.studymafia.org
More informationSecure Network Monitoring System using Mobile Agent
1 Secure Network Monitoring System using Mobile Agent G. M. Gaikwad 1, A. M. Kanthe 2, M. S. Chaudhari 3 1,2,3 Department of Computer Engg. Sinhgad Institute of Technology, Lonavala (India) 1 gmgaikwad@gmail.com
More informationLecture 5: Foundation of Network Management
Lecture 5: Foundation of Network Management Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4395 5-1 Network Management Standards OSI: Common Management Information
More informationA Web-Based Real-Time Traffic Monitoring Scheme Using CORBA
A Web-Based Real-Time Traffic Monitoring Scheme Using CORBA Yuming Jiang, Chen-Khong Tham, Chi-Chung Ko Department of Electrical Engineering, National University of Singapore, 10 Kent Ridge Crescent, Singapore
More informationHow To Understand Network Performance Monitoring And Performance Monitoring Tools
http://www.cse.wustl.edu/~jain/cse567-06/ftp/net_traffic_monitors2/ind... 1 of 11 SNMP and Beyond: A Survey of Network Performance Monitoring Tools Paul Moceri, paul.moceri@gmail.com Abstract The growing
More informationSIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP)
1 SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP) Mohammad S. Hasan Agenda 2 Looking at Today What is a management protocol and why is it needed Addressing a variable within SNMP Differing versions Ad-hoc Network
More informationThe EMSX Platform. A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks. A White Paper.
The EMSX Platform A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks A White Paper November 2002 Abstract: The EMSX Platform is a set of components that together provide
More informationSNMP and Network Management
SNMP and Network Management Nixu Oy Nixu Ltd PL 21 (Mäkelänkatu 91) 00601 Helsinki, Finland tel. +358 9 478 1011 fax. +358 9 478 1030 info@nixu.fi http://www.nixu.fi Contents Network Management MIB naming
More informationBEA WebLogic Server. and BEA WebLogic Express. SNMP Management Guide
BEA WebLogic Server and BEA WebLogic Express SNMP Management Guide BEA WebLogic Server Version 6.1 Document Date: December 19, 2001 Copyright Copyright 2001 BEA Systems, Inc. All Rights Reserved. Restricted
More informationSimulation of an SNMP Agent: Operations, Analysis and Results
International Journal of Electronics and Computer Science Engineering 1919 Available Online at www.ijecse.org ISSN- 2277-1956 Simulation of an SNMP Agent: Operations, Analysis and Results Pradeep Kumar
More informationSNMP Network Management Concepts
SNMP Network Management Concepts Chu-Sing Yang Department of Electrical Engineering National Cheng Kung University Outline Background Basic Concepts Summary The Origins of TCP/IP Starts at 1969, and founded
More informationNetwork Management for Picture Archiving and Communication Systems
Network Management for Picture Archiving and Communication Systems Master of Engineering School of Engineering Science Simon Fraser University November 21, 2006 Road Map Introduction Hospital overview
More informationDevice Discover: A Component for Network Management System using Simple Network Management Protocol
Device Discover: A Component for Network Management System using Simple Network Management Protocol Garima Gupta, Daya Gupta Abstract Virtually all existing networked system management tools use a Manager/Agent
More informationSNMP -overview. Based on: W.Stallings Data and Computer Communications
SNMP -overview Based on: W.Stallings Data and Computer Communications Network Management -SNMP Simple Network Management Protocol (not so simple ) Dominant standardized network management scheme in use
More informationA Study of Web-Based SNMP Network Management. with a Simple Java Applet Network Monitoring Tool
A Study of Web-Based SNMP Network Management with a Simple Java Applet Network Monitoring Tool Submitted to Committee Members Dr. W. Homer Carlisle(Chair) Dr. Kai H Chang Dr. Alvin S. Lim Submitted by
More informationNetwork Management (NETW-1001)
Network Management (NETW-1001) Dr. Mohamed Abdelwahab Saleh IET-Networks, GUC Spring 2016 TOC 1 Architecture of NMSs 2 OSI Network Management 3 Telecom Management Network 4 SNMP 5 SMI and MIB Remote Management
More informationSNMP Basics BUPT/QMUL 2015-05-12
SNMP Basics BUPT/QMUL 2015-05-12 Agenda Brief introduction to Network Management Brief introduction to SNMP SNMP Network Management Framework RMON New trends of network management Summary 2 Brief Introduction
More informationMANAGING NETWORK COMPONENTS USING SNMP
MANAGING NETWORK COMPONENTS USING SNMP Abubucker Samsudeen Shaffi 1 Mohanned Al-Obaidy 2 Gulf College 1, 2 Sultanate of Oman. Email: abobacker.shaffi@gulfcollegeoman.com mohaned@gulfcollegeoman.com Abstract:
More informationireasoning SNMP API User Guide
ireasoning SNMP API User Guide Copyright 2002-2010 ireasoning Inc., All Rights Reserved. The information contained herein is the property of ireasoning Inc. This document may not be copied, reproduced,
More informationMonitoring Network QoS in a Dynamic Real-Time System 1
Monitoring Network QoS in a Dynamic Real-Time System Hong Chen, Brett Tjaden, Lonnie Welch, Carl Bruggeman, Lu Tong, Barbara Pfarr School of Electrical Engineering and Computer Science Ohio University,
More informationA Brief. Introduction. of MG-SOFT s SNMP Network Management Products. Document Version 1.3, published in June, 2008
A Brief Introduction of MG-SOFT s SNMP Network Management Products Document Version 1.3, published in June, 2008 MG-SOFT s SNMP Products Overview SNMP Management Products MIB Browser Pro. for Windows and
More informationA standards-based network monitoring system
A standards-based network monitoring system Javier F. Díaz Laura A. Fava Alejandro J. Sabolansky Computer Science School, National University of La Plata 50 and 120, 2nd floor, La Plata, Buenos Aires,
More informationA Guide to Understanding SNMP
A Guide to Understanding SNMP Read about SNMP v1, v2c & v3 and Learn How to Configure SNMP on Cisco Routers 2013, SolarWinds Worldwide, LLC. All rights reserved. Share: In small networks with only a few
More informationNetwork traffic monitoring and management. Sonia Panchen sonia.panchen@inmon.com 11 th November 2010
Network traffic monitoring and management Sonia Panchen sonia.panchen@inmon.com 11 th November 2010 Lecture outline What is network traffic management? Traffic management applications Traffic monitoring
More informationIntroduction to Simple Network Management Protocol (SNMP)
Introduction to Simple Network Management Protocol (SNMP) Simple Network Management Protocol (SNMP) is an application layer protocol for collecting information about devices on the network. It is part
More informationSimple Network Management Protocol (SNMP) Primer
Xerox Multifunction Devices July 22, 2003 for the user Simple Network Management Protocol (SNMP) Primer Purpose This document introduces the history, purpose, basic functionality and common uses of SNMP
More informationFurther we designed a management system on the basis of our proposed architecture that supports basic management functions.
Abstract Most Internet networking devices are now equipped with a Web server for providing Web-based element management so that an administrator may take advantage of this enhanced and powerful management
More informationSimple Network Management Protocol
CS 556 - Networks II Internet Teaching Lab (MCS B-24) Simple Network Mgmt Protocol (SNMP) Simple Network Management Protocol What you will learn in this lab: Details of the SNMP protocol. Contents of a
More informationA Framework for End-to-End Proactive Network Management
A Framework for End-to-End Proactive Network Management S. Hariri, Y. Kim, P. Varshney, Department of Electrical Engineering and Computer Science Syracuse University, Syracuse, NY 13244 {hariri, yhkim,varshey}@cat.syr.edu
More informationSimple Network Management Protocol
CHAPTER 32 Simple Network Management Protocol Background Simple Network Management Protocol (SNMP) is an application-layer protocol designed to facilitate the exchange of management information between
More informationSimple Network Management Protocol
CHAPTER 4 This chapter gives an overview of (SNMP). It contains the following sections: Overview, page 4-1 SNMP Versioning, page 4-2 SNMP and Cisco Unified CM Basics, page 4-3 SNMP Basic Commands, page
More informationCommunications and Computer Networks
SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the
More informationSimple Network Management Protocol SNMP
Kommunikationssysteme (KSy) - Block 7 Simple Network Management Protocol SNMP Dr. Andreas Steffen 2000-2001 A. Steffen, 12.02.2001, KSy_SNMP.ppt 1 Definitions client/server network management application
More informationChapter 18. Network Management Basics
Network Management Basics > FCAPS Model Chapter 18. Network Management Basics This chapter covers the following topics: FCAPS Model Network Management Architecture Network Management Protocols An Introduction
More informationTUTORIAL SNMP: STATUS AND APPLICATION FOR LAN/MAN MANAGEMENT. Aiko Pras pras@cs.utwente.nl
TUTORIAL SNMP: STATUS AND APPLICATION FOR LAN/MAN MANAGEMENT 9 July 1996 Aiko Pras pras@cs.utwente.nl http://wwwtios.cs.utwente.nl/~pras http://wwwtios.cs.utwente.nl/ http://wwwsnmp.cs.utwente.nl/ Copyright
More informationTÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS
Mestrado em Engenharia de Redes de Comunicações TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS 2008-2009 Gestão de Redes e Serviços, Segurança - Networks and Services Management, Security 1 Outline
More informationAdvanced Network Monitoring Applications Based on Mobile/Intelligent Agent Technology
Advanced Network Monitoring Applications Based on Mobile/Intelligent Agent Technology Damianos Gavalas, Dominic Greenwood *, Mohammed Ghanbari, Mike O Mahony Communication Networks Research Group, Electronic
More informationSNMP. Simple Network Management Protocol
SNMP Simple Network Management Protocol Introduction SNMP Simple Network Management Protocol A set of standards for network management Protocol Database structure specification Data objects A set of standardized
More informationSubnetting and Network Management Omer F. Rana. Networks and Data Communications 1
Subnetting and Network Management Omer F. Rana Networks and Data Communications 1 Subnetting Subnetting is an important concept in establishing TCP/IP based networks important in integrating small Local
More informationAlternatives to SNMP and Challenges in Management Protocols. Communication Systems Seminar Talk 10 Francesco Luminati
Alternatives to SNMP and Challenges in Management Protocols Communication Systems Seminar Talk 10 Francesco Luminati Introduction Structure Network management Management approaches SNMP Alternatives: NetConf
More informationHow to Obtain an OPC License--5. Creating a System Code 5 Entering an Authorization Code 6. Getting Started with SNMP Editor--7
Contents Introduction--1 Product definition 1 Implementing SNMP 2 Integrating SNMP into the user interface 3 Components of OPC SNMP Gateway 4 How to Obtain an OPC License--5 Creating a System Code 5 Entering
More informationMaster Subagent Based Architecture to Monitor and Manage Nodes in Mobile Ad-hoc Networks
Vishalakshi Prabhu H / International Journal of Engineering Research and Applications (IJERA) Master Subagent Based Architecture to Monitor and Manage Nodes in Mobile Ad-hoc Networks Vishalakshi Prabhu
More informationSimple Network Management Protocol
56 CHAPTER Chapter Goals Discuss the SNMP Management Information Base. Describe SNMP version 1. Describe SNMP version 2. Background The (SNMP) is an application layer protocol that facilitates the exchange
More informationFile Transfer And Access (FTP, TFTP, NFS) Chapter 25 By: Sang Oh Spencer Kam Atsuya Takagi
File Transfer And Access (FTP, TFTP, NFS) Chapter 25 By: Sang Oh Spencer Kam Atsuya Takagi History of FTP The first proposed file transfer mechanisms were developed for implementation on hosts at M.I.T.
More informationBrocade Product Training
Brocade Product Training Introducing SNMP Web-based Training Brocade Education Services Page 1-1 Objectives Describe SNMP basics: terminology and concepts Describe the need for SNMP Describe the advantages
More informationSecurity vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
More informationAssignment One. ITN534 Network Management. Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition)
Assignment One ITN534 Network Management Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition) Unit Co-coordinator, Mr. Neville Richter By, Vijayakrishnan Pasupathinathan
More informationAutomatic Configuration and Service Discovery for Networked Smart Devices
Automatic Configuration and Service Discovery for Networked Smart Devices Günter Obiltschnig Applied Informatics Software Engineering GmbH St. Peter 33 9184 St. Jakob im Rosental Austria Tel: +43 4253
More informationAn Overview of SNMP on the IMG
An Overview of SNMP on the IMG Description SNMP The SNMP provides a way to control and monitor a variety of equipment using one network management protocol. To do this, SNMP uses a number of common Management
More informationAdditional Information: A link to the conference website is available at: http://www.curtin.edu.my/cutse2008/index.html
Citation: Veeramani, S. and Gopal, Lenin. 2008. Network monitoring tool, in Curtin University of Technology (ed), Curtin University of Technology Science and Engineering International Conference CUTSE
More informationTik-109/110.300 Telecommunications architectures:
Tik-109/110.300 Telecommunications architectures: Network management Hannu H. KARI/Helsinki University of Technology (HUT) TML-laboratory/CS/HUT Tik-109/110.300 Fall 2000 Hannu H. Kari Page 1 Agenda Telecom
More informationLayering a computing infrastructure. Middleware. The new infrastructure: middleware. Spanning layer. Middleware objectives. The new infrastructure
University of California at Berkeley School of Information Management and Systems Information Systems 206 Distributed Computing Applications and Infrastructure Layering a computing infrastructure Middleware
More informationA Study of the Behaviour of the Simple Network Management Protocol
A Study of the Behaviour of the Simple Network Management Protocol Colin Pattinson School of Computing, Leeds Metropolitan University, Beckett Park, Leeds LS6 3QS UK E-Mail : c.pattinson@lmu.ac.uk The
More informationStateful Inspection Technology
Stateful Inspection Technology Security Requirements TECH NOTE In order to provide robust security, a firewall must track and control the flow of communication passing through it. To reach control decisions
More informationNMS300 Network Management System
NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate
More informationUnderstanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX
APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix
More informationCHAPTER 1 INTRODUCTION
CHAPTER 1 INTRODUCTION 1.1 Introduction Service Discovery Protocols (SDPs) are network protocols which allow automatic detection of devices and services offered by these devices on a computer network [1].
More informationChapter 2: Remote Procedure Call (RPC)
Chapter 2: Remote Procedure Call (RPC) Gustavo Alonso Computer Science Department Swiss Federal Institute of Technology (ETHZ) alonso@inf.ethz.ch http://www.iks.inf.ethz.ch/ Contents - Chapter 2 - RPC
More informationAgenda. Distributed System Structures. Why Distributed Systems? Motivation
Agenda Distributed System Structures CSCI 444/544 Operating Systems Fall 2008 Motivation Network structure Fundamental network services Sockets and ports Client/server model Remote Procedure Call (RPC)
More informationOracle WebLogic Server
Oracle WebLogic Server WebLogic SNMP Management Guide 10g Release 3 (10.3) July 2008 Oracle WebLogic Server WebLogic SNMP Management Guide, 10g Release 3 (10.3) Copyright 2007, 2008, Oracle and/or its
More informationA Java Based Tool for Testing Interoperable MPI Protocol Conformance
A Java Based Tool for Testing Interoperable MPI Protocol Conformance William George National Institute of Standards and Technology 100 Bureau Drive Stop 8951 Gaithersburg MD 20899 8951 1 301 975 4943 william.george@nist.gov
More informationCisco CMTS Router MIB Overview
CHAPTER 1 This chapter provides an overview of the Cisco Cable Modem Termination System (CMTS) router. This chapter contains the following topics: MIB Description, page 1-1 Benefits of MIB Enhancements,
More informationCLOUD MONITORING BASED ON SNMP
CLOUD MONITORING BASED ON SNMP 1 J. SWARNA, 2 C. SENTHIL RAJA, 3 DR.K.S.RAVICHANDRAN 1,3 SASTRA University, Thanjavur, Tamil Nadu, India 2 Alcatel-Lucent India Limited, Chennai, India Email: 1 swarna.jp@gmail.com
More informationSNMP Simple Network Management Protocol
SNMP Simple Network Management Protocol Simple Network Management Protocol SNMP is a framework that provides facilities for managing and monitoring network resources on the Internet. Components of SNMP:
More informationNNMi120 Network Node Manager i Software 9.x Essentials
NNMi120 Network Node Manager i Software 9.x Essentials Instructor-Led Training For versions 9.0 9.2 OVERVIEW This course is designed for those Network and/or System administrators tasked with the installation,
More informationITEC310 Computer Networks II
ITEC310 Computer Networks II Chapter 28 Network Management: Department of Information Technology Eastern Mediterranean University Objectives 2/60 After completing this chapter you should be able to do
More informationData Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment
White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based
More informationThe ABCs of SNMP. Info Sheet. The ABC of SNMP INTRODUCTION. SNMP Versions
The ABCs of SNMP INTRODUCTION One of the numerous acronyms from the Internet world is SNMP which stands for Simple Network Management Protocol. Of course, anything termed simple is suspect. SNMP is an
More informationNetwork Management. Jaakko Kotimäki. Department of Computer Science Aalto University, School of Science. 21. maaliskuuta 2016
Jaakko Kotimäki Department of Computer Science Aalto University, School of Science Outline Introduction SNMP architecture Management Information Base SNMP protocol Network management in practice Niksula
More informationSIP Protocol as a Communication Bus to Control Embedded Devices
229 SIP Protocol as a Communication Bus to Control Embedded Devices Ramunas DZINDZALIETA Institute of Mathematics and Informatics Akademijos str. 4, Vilnius Lithuania ramunas.dzindzalieta@gmail.com Abstract.
More informationPRODUCTIVITY ESTIMATION OF UNIX OPERATING SYSTEM
Computer Modelling & New Technologies, 2002, Volume 6, No.1, 62-68 Transport and Telecommunication Institute, Lomonosov Str.1, Riga, LV-1019, Latvia STATISTICS AND RELIABILITY PRODUCTIVITY ESTIMATION OF
More informationAbstract. An SNMP Agent for a DTV Data Server. Dinkar Bhat David Catapano James Kenealy Gomer Thomas
An SNMP Agent for a DTV Data Server by Dinkar Bhat David Catapano James Kenealy Gomer Thomas Abstract This paper presents a framework for remote control and monitoring of a DTV data server using the Simple
More informationJean Parrend 1/6 SNMP. Content. 1. Introduction...1
Jean Parrend 1/6 SNMP Content 1. Introduction...1 2. SNMP architecture 1 3. The Management Information Base...3 4. Packet types and structure..4 5. Layered communication...5 Traversing the layers 6. References.6
More information2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring
2057-15 First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 7-25 September 2009 TCP/IP Networking Abhaya S. Induruwa Department
More informationAndrew McRae Megadata Pty Ltd. andrew@megadata.mega.oz.au
A UNIX Task Broker Andrew McRae Megadata Pty Ltd. andrew@megadata.mega.oz.au This abstract describes a UNIX Task Broker, an application which provides redundant processing configurations using multiple
More informationSecure Use of the New NHS Network (N3): Good Practice Guidelines
Programme NPFIT Document Record ID Key Sub-Prog / Project Information Governance NPFIT-FNT-TO-IG-GPG-0003.01 Prog. Director Mark Ferrar Status Approved Owner Tim Davis Version 1.0 Author Phil Benn Version
More informationUSING MOBILE AGENTS TO IMPROVE PERFORMANCE OF NETWORK MANAGEMENT OPERATIONS
USING MOBILE AGENTS TO IMPROVE PERFORNCE OF NETWORK NAGEMENT OPERATIONS Iwan Adhicandra, Colin Pattinson, Ebrahim Shaghouei Computer Communications Research Group, School of Computing, Leeds Metropolitan
More informationSNMP....Simple Network Management Protocol...
SNMP...Simple Network Management Protocol... Outline of the SNMP Framework SNMP Transport Architecture UDP unreliable transport layer Manager process SNMP UDP IP Physical protocol Agent process SNMP UDP
More informationHow To Manage A Network With Kepware
Simple Network Management Protocol (SNMP) Products Kepware Product Offerings from Eternity Sales SNMP OPC Server: SNMP Manager used to poll SNMP Agents/Devices SNMP Agent: used to make KEPServerEX data
More informationAgent Languages. Overview. Requirements. Java. Tcl/Tk. Telescript. Evaluation. Artificial Intelligence Intelligent Agents
Agent Languages Requirements Overview Java Tcl/Tk Telescript Evaluation Franz J. Kurfess, Cal Poly SLO 211 Requirements for agent Languages distributed programming large-scale (tens of thousands of computers)
More informationConfiguring SNMP. 2012 Cisco and/or its affiliates. All rights reserved. 1
Configuring SNMP 2012 Cisco and/or its affiliates. All rights reserved. 1 The Simple Network Management Protocol (SNMP) is part of TCP/IP as defined by the IETF. It is used by network management systems
More informationConfiguring Simple Network Management Protocol (SNMP)
Configuring Simple Network Management Protocol (SNMP) This chapter describes the Simple Network Management Protocol (SNMP), SNMP Management Information Bases (MIBs), and how to configure SNMP on Cisco
More informationA Survey Study on Monitoring Service for Grid
A Survey Study on Monitoring Service for Grid Erkang You erkyou@indiana.edu ABSTRACT Grid is a distributed system that integrates heterogeneous systems into a single transparent computer, aiming to provide
More informationArchitecture of a Distributed Object Firewall Proxy. Abstract
NAI Labs #0768 Architecture of a Distributed Object Firewall Proxy July 16, 2000 Gary Lamperillo Gary_Lamperillo@NAI.com NAI Labs - The Security Research Division Network Associates 3415 S. Sepulveda Blvd.
More informationSystem and Network Management
- System and Network Management Network Management : ability to monitor, control and plan the resources and components of computer system and networks network management is a problem created by computer!
More informationGeneric SNMP Proxy Agent Framework for Management of Heterogeneous Network Elements
Generic SNMP Proxy Agent Framework for Management of Heterogeneous Network Elements Santosh S. Chavan 1 and R. Madanagopal 1 1 NMSWorks Software Pvt. Ltd, Chennai-600036, India Phone: +91-44-22570433,
More informationHeterogeneous Tools for Heterogeneous Network Management with WBEM
Heterogeneous Tools for Heterogeneous Network Management with WBEM Kenneth Carey & Fergus O Reilly Adaptive Wireless Systems Group Department of Electronic Engineering Cork Institute of Technology, Cork,
More informationQuantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand
More informationTELE 301 Network Management
TELE 301 Network Management Lecture 20: Management Tools and Protocols Haibo Zhang Computer Science, University of Otago TELE301 Lecture 20: Management tools and protocols 1 What is Network Management?
More informationSecurity. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
More informationEfficient Network Management (236635) Final Project
Efficient Network Management (36635) Final Project Project Title: SNMP Agent for large data transfer Team: Kfir Karmon (ID 3797696) Tsachi Sharfman (ID 97399). Problem Description One of the weaknesses
More informationHow To Manage A Network With Mobile Agents
A Framework for Network Management using Mobile Agents Manoj Kumar Kona and Cheng-Zhong Xu Department of Electrical and Computer Engineering Wayne State University, Detroit, MI 48202 {manoj, czxu}@ernie.eng.wayne.edu
More informationEnabling SSL and Client Certificates on the SAP J2EE Engine
Enabling SSL and Client Certificates on the SAP J2EE Engine Angel Dichev RIG, SAP Labs SAP AG 1 Learning Objectives As a result of this session, you will be able to: Understand the different SAP J2EE Engine
More informationTimePictra Release 10.0
DATA SHEET Release 100 Next Generation Synchronization System Key Features Web-based multi-tier software architecture Comprehensive FCAPS management functions Software options for advanced FCAPS features
More informationComparison of SNMP. Versions 1, 2 and 3
Comparison of SNMP 1 Comparison of SNMP Versions 1, 2 and 3 Eddie Bibbs Brandon Matt ICTN 4600-001 Xin Tang April 17, 2006 Comparison of SNMP 2 During its development history, the communities of researchers,
More informationOutline of the SNMP Framework
2 SNMP--A Management Protocol and Framework Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology stadler@ee.kth.se September 2008 Outline of the SNMP Framework Management Program
More informationWLAN TRAFFIC GRAPHING APPLICATION USING SIMPLE NETWORK MANAGEMENT PROTOCOL *
WLAN TRAFFIC GRAPHING APPLICATION USING SIMPLE NETWORK MANAGEMENT PROTOCOL * Bhargavi Hiremagalur and Dulal C. Kar Department of Computing and Mathematical Sciences, Texas A&M University-Corpus Christi,
More informationChapter 2 TOPOLOGY SELECTION. SYS-ED/ Computer Education Techniques, Inc.
Chapter 2 TOPOLOGY SELECTION SYS-ED/ Computer Education Techniques, Inc. Objectives You will learn: Topology selection criteria. Perform a comparison of topology selection criteria. WebSphere component
More information